False positive on libglib2.0-0t64 version 2.86.3-4 for CVE-2025-13601
#10013
benglewis
started this conversation in
False Detection
Replies: 1 comment 1 reply
-
|
This is a known issue that occurs when packages from a different repository (in this case, sid) are installed on a system detected as another release (trixie). Root CauseTrivy detects your OS as Debian 13 (trixie) and uses the trixie vulnerability database. According to the Debian Security Tracker:
Your installed version Related Issues
Why Automatic Detection is DifficultWe have previously investigated whether Trivy could automatically detect the source repository:
Potential ImprovementsAlthough we're not sure that the following approaches are appropriate:
|
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
CVE-2025-13601
Description
See: https://gitlab.gnome.org/GNOME/glib/-/blob/2.86.3/NEWS?ref_type=tags
The vulnerability fix was back-ported to 2.86.3
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
Debian 13 Trixie
Debug Output
I couldn't find an easy way to get this out of the Trivy GitHub Action workflow without changing our code, which doesn't seem logical.
Version
Likewise, I couldn't find an easy way to get this out of the Trivy GitHub Action workflow without changing our code, which doesn't seem logical.
Checklist
-f jsonthat shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions